YoVDO

Extending Information Security Methodologies for Personal User in Protecting PII

Offered By: YouTube

Tags

ShmooCon Courses Data Classification Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to apply information security methodologies to protect personal identifiable information (PII) in this 25-minute conference talk. Explore the process of identifying critical information assets, classifying sensitive data, and assigning impact values. Discover techniques for conducting a family personal assessment, evaluating third-party risks, and addressing privacy gaps. Gain insights into testing policies, documenting vulnerabilities, and identifying opportunities for improvement in safeguarding personal data.

Syllabus

Intro
Why are we here
This is not a checklist
The methodology
Application of methodologies
Who am I
What are you protecting
Identify critical information assets
Identify sensitive information
Identify where sensitive information exists
Separate data by classification
Assign impact value
Assign highwater mark
Family Personal Assessment
Third Parties
Gap in Privacy
The Basic Process
Testing Policies
Evaluating Information
Document Vulnerability
Number
Results
Opportunities for Improvement


Related Courses

Chip Decapping on a Budget
0xdade via YouTube
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
0xdade via YouTube
Whitelisting LD PRELOAD for Fun and No Profit
0xdade via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
Real World Zero Trust Implementation
0xdade via YouTube